Analysis
-
max time kernel
122s -
max time network
124s -
platform
windows10_x64 -
resource
win10 -
submitted
15-07-2020 13:39
Static task
static1
Behavioral task
behavioral1
Sample
RFQ.pdf.exe
Resource
win7v200430
windows7_x64
0 signatures
0 seconds
Behavioral task
behavioral2
Sample
RFQ.pdf.exe
Resource
win10
windows10_x64
0 signatures
0 seconds
General
-
Target
RFQ.pdf.exe
-
Size
1.1MB
-
MD5
40ebf8bb674b984b2485616e70581f47
-
SHA1
9459e7e5c22744f79477aa0aeea03d628bfb9cc3
-
SHA256
a56855064cde16356d60565bc667ae8450e8604f66b6c30dfe94c97703e36a96
-
SHA512
f0a88a5ef1de7bdb76bcf92699e1c6e484adbd4e4642ce705cb5f923feaa3965f5d4be7f52c7a9cec219a4ebe27eb83f62882ebcf066d2cd7ac28c55654a989f
Score
3/10
Malware Config
Signatures
-
Program crash 1 IoCs
pid pid_target Process procid_target 3864 3828 WerFault.exe 66 -
Suspicious behavior: EnumeratesProcesses 13 IoCs
pid Process 3864 WerFault.exe 3864 WerFault.exe 3864 WerFault.exe 3864 WerFault.exe 3864 WerFault.exe 3864 WerFault.exe 3864 WerFault.exe 3864 WerFault.exe 3864 WerFault.exe 3864 WerFault.exe 3864 WerFault.exe 3864 WerFault.exe 3864 WerFault.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeRestorePrivilege 3864 WerFault.exe Token: SeBackupPrivilege 3864 WerFault.exe Token: SeDebugPrivilege 3864 WerFault.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\RFQ.pdf.exe"C:\Users\Admin\AppData\Local\Temp\RFQ.pdf.exe"1⤵PID:3828
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3828 -s 9362⤵
- Program crash
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3864
-